Vulnerability Name:

CVE-2015-4002 (CCN-103752)

Assigned:2015-05-27
Published:2015-05-27
Updated:2022-11-03
Summary:drivers/staging/ozwpan/ozusbsvc1.c in the OZWPAN driver in the Linux kernel through 4.0.5 does not ensure that certain length values are sufficiently large, which allows remote attackers to cause a denial of service (system crash or large loop) or possibly execute arbitrary code via a crafted packet, related to the (1) oz_usb_rx and (2) oz_usb_handle_ep_data functions.
CVSS v3 Severity:8.6 High (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): Low
Integrity (I): Low
Availibility (A): High
CVSS v2 Severity:9.0 High (CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:C)
6.6 Medium (Temporal CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:C/E:U/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Authentication (Au): None
Impact Metrics:Confidentiality (C): Partial
Integrity (I): Partial
Availibility (A): Complete
9.0 High (CCN CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:C)
6.6 Medium (CCN Temporal CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:C/E:U/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Athentication (Au): None
Impact Metrics:Confidentiality (C): Partial
Integrity (I): Partial
Availibility (A): Complete
Vulnerability Type:CWE-119
Vulnerability Consequences:Gain Access
References:Source: MITRE
Type: CNA
CVE-2015-4002

Source: CONFIRM
Type: Vendor Advisory
http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=9a59029bc218b48eff8b5d4dde5662fd79d3e1a8

Source: CCN
Type: Linux Kernel GIT Repository
ozwpan: Use proper check to prevent heap overflow

Source: CONFIRM
Type: Vendor Advisory
http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=d114b9fe78c8d6fc6e70808c2092aa307c36dc8e

Source: SUSE
Type: Mailing List, Third Party Advisory
openSUSE-SU-2015:1382

Source: MLIST
Type: Mailing List
[oss-security] 20150605 Re: CVE Request: Linux Kernel Ozwpan Driver - Remote packet-of-death vulnerabilities

Source: CCN
Type: oss-security Mailing List, Wed, 27 May 2015 16:45:15 +0200
CVE Request: Linux Kernel Ozwpan Driver - Remote packet-of-death vulnerabilities

Source: CCN
Type: oss-security Mailing List, Fri, 5 Jun 2015 17:29:22 -0400 (EDT)
Re: CVE Request: Linux Kernel Ozwpan Driver - Remote packet-of-death vulnerabilities

Source: BID
Type: Third Party Advisory, VDB Entry
74668

Source: CCN
Type: BID-74668
Linux Kernel 'ozwpan' Driver Multiple Denial of Service Vulnerabilities

Source: UBUNTU
Type: Third Party Advisory
USN-2665-1

Source: UBUNTU
Type: Third Party Advisory
USN-2667-1

Source: XF
Type: UNKNOWN
linux-kernel-cve20154002-code-exec(103752)

Source: CONFIRM
Type: Vendor Advisory
https://github.com/torvalds/linux/commit/9a59029bc218b48eff8b5d4dde5662fd79d3e1a8

Source: CONFIRM
Type: Vendor Advisory
https://github.com/torvalds/linux/commit/d114b9fe78c8d6fc6e70808c2092aa307c36dc8e

Source: CCN
Type: WhiteSource Vulnerability Database
CVE-2015-4002

Vulnerable Configuration:Configuration 1:
  • cpe:/o:linux:linux_kernel:*:*:*:*:*:*:*:* (Version >= 3.15 and < 3.16.35)
  • OR cpe:/o:linux:linux_kernel:*:*:*:*:*:*:*:* (Version < 3.4.109)
  • OR cpe:/o:linux:linux_kernel:*:*:*:*:*:*:*:* (Version >= 3.5 and < 3.10.81)
  • OR cpe:/o:linux:linux_kernel:*:*:*:*:*:*:*:* (Version >= 3.11 and < 3.12.45)
  • OR cpe:/o:linux:linux_kernel:*:*:*:*:*:*:*:* (Version >= 3.13 and < 3.14.45)
  • OR cpe:/o:linux:linux_kernel:*:*:*:*:*:*:*:* (Version >= 3.17 and < 3.18.18)
  • OR cpe:/o:linux:linux_kernel:*:*:*:*:*:*:*:* (Version >= 3.19 and < 4.0.6)

  • Configuration 2:
  • cpe:/o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
  • OR cpe:/o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*

  • Configuration 3:
  • cpe:/o:opensuse:opensuse:13.2:*:*:*:*:*:*:*

  • Configuration CCN 1:
  • cpe:/o:linux:linux_kernel:4.0.5:*:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    Oval Definitions
    Definition IDClassTitleLast Modified
    oval:org.opensuse.security:def:20154002
    V
    CVE-2015-4002
    2022-05-20
    oval:com.ubuntu.precise:def:20154002000
    V
    CVE-2015-4002 on Ubuntu 12.04 LTS (precise) - medium.
    2015-06-07
    oval:com.ubuntu.xenial:def:201540020000000
    V
    CVE-2015-4002 on Ubuntu 16.04 LTS (xenial) - medium.
    2015-06-07
    oval:com.ubuntu.trusty:def:20154002000
    V
    CVE-2015-4002 on Ubuntu 14.04 LTS (trusty) - medium.
    2015-06-07
    oval:com.ubuntu.xenial:def:20154002000
    V
    CVE-2015-4002 on Ubuntu 16.04 LTS (xenial) - medium.
    2015-06-07
    BACK
    linux linux kernel *
    linux linux kernel *
    linux linux kernel *
    linux linux kernel *
    linux linux kernel *
    linux linux kernel *
    linux linux kernel *
    canonical ubuntu linux 15.10
    canonical ubuntu linux 14.04
    opensuse opensuse 13.2
    linux linux kernel 4.0.5